Table Of Contents. Configuring Additional Scan Options Configuring Messenger Scanning iii

Size: px
Start display at page:

Download "Table Of Contents. Configuring Additional Scan Options Configuring Messenger Scanning iii"

Transcription

1 K7TotalSecurity Pro

2

3 Table Of Contents K7TotalSecurity Pro... 1 K7TotalSecurity Pro Help... 1 Components of K7TotalSecurity Pro... 1 Feature Summary... 2 Online Help Conventions... 5 Getting Started... 7 Activating Your Product... 7 Opening the Main Console... 8 Overview of the Main Console... 9 Viewing the Current Status of Your Protection Enabling K7TotalSecurity Pro Disabling K7TotalSecurity Pro Un-Installing K7TotalSecurity Pro Manage Settings Set Password Password protection alert Managing Alerts Configuring Alerts Gaming Mode Alert Enabling Gaming Mode Disable Gaming Mode Updating Your Product Updating Your Product Automatically Checking for Updates Using the Desktop Update Manager Manually Checking for Updates Disabling Automatic Updates Protecting Against Viruses Managing the Virus Protection Configuring the AntiMalware Configuring the Real-Time Scanner Configuring the Real-Time Scanner Enabling Real-Time Scan Disabling Real-Time Scan Configuring the Types of Threats to Scan Managing Exclusions Configuring the System Monitor Configuring the System Monitor Enabling the System Monitor Disabling the System Monitor Configuring the System Check Points Viewing System Monitor Events Managing Quarantined Files Managing Quarantined Files Adding Files to the Quarantine Folder Restoring Quarantined Files Deleting Quarantined Files Configuring Additional Scan Options Configuring Additional Scan Options Configuring Messenger Scanning iii

4 K7TotalSecurity Pro Configuring Office Plugin Scanning Configuring the Scan Settings Configuring the Scan Settings Selecting the Types of Files to Scan Adding File Extensions for the Scan Managing Scanner Tasks Configuring Scan Tasks Configuring the QuickScan Creating Custom Scan Tasks Customizing a Scan Task Scheduling Scan Tasks Changing Schedules for Scan Tasks Manually Running a Scan Task Deleting Scan Tasks Configuring Device Access Enabling Device Access Disabling Device Access Setting Access Restrictions for Devices Setting password for a device Configuring Autorun for a device Scan a device Device password prompt Configuring Carnivore About Carnivore Carnivore - Browser Protection Carnivore - Exploit Protection Carnivore - HIPS Scanning Your Computer About Scans Running QuickScan Running Rootkits Scanner Running Tracking Cookies Scanner Scanning Your Entire Computer Scanning a Folder Scanning a File Scanning Multiple Locations Scanning system for vulnerabilities Scanning system for abnormal changes Configuring the General Scan Settings Configuring the Log Options Viewing Virus Information on the Web Configuring the Scanner Configuring the Scanner Enabling the Scan Disabling the Scan Configuring Server Settings Scanning for Malicious Attachments Configuring the Worm Blocking Settings Mass mail alert Web Protection Configuring Web Protection Managing Safe Search Managing Safe Surf iv

5 Table Of Contents Protecting Against Internet Attacks Managing the Firewall Managing Your FireWall Firewall Rules Displaying Firewall Alerts Configuring Your Firewall Settings Disabling the Firewall Components Managing Connections Managing Network Zones Adding a Connection Editing a Connection Configuring Application Access Control Customizing Application Access Control Adding an Application to the Access Control Configuring Application Specific Rules Editing the Application Access Control Removing an Application from Access Control Managing Exceptions Configuring Rules Intrusion Detection Intrusion Detection Configuring the General Firewall Settings Protecting Your Privacy Managing Your Privacy Service Managing Your Privacy Configuring Your Privacy Service Protecting Privacy Information Protecting Privacy Information Adding Privacy Information Editing Privacy Information Deleting Privacy Information Managing Exceptions Sensitive Information Prompt Protecting Against Spam Mails Managing Your AntiSpam Managing K7AntiSpam Enabling the AntiSpam Disabling the AntiSpam Configuring Your AntiSpam Configuring Your AntiSpam Configuring the Allowed List Configuring the Blocked List Configuring Custom Spam Filter Rules Configuring Smart Analysis Enabling the Online Spam Analyzer Configuring the Security Integrating with Clients Configuring the General AntiSpam Settings Protecting Your Data - Backup Managing Backups Enable Automatic Backup Disable Automatic Backup Creating a Backup Set v

6 K7TotalSecurity Pro Editing a Backup Set Deleting a Backup Set Deleting Backed Up Files Restoring Files from Backup Manually Running the Backup Explorer Integration Parental Control Managing Your Parental Control Managing Parental Control Enabling Your Parental Control Disabling Your Parental Control Configuring User Profiles Configuring User Profiles About User Profiles Editing User Profiles Customizing the Web Filter Customizing Your Browser Settings Configuring Ad Block Keywords Configuring Application Control Logs Using the Log Viewer Logging AntiMalware Activities Logging Firewall Activities Viewing the AntiMalware Activity Log Viewing the Firewall Log Viewing the Privacy Log Viewing the Backup Log Additional Tools Additional Tools Rescue Disc How to use the Bootable Disc Glossary Index vi

7 K7TotalSecurity Pro K7TotalSecurity Pro Help Welcome to K7TotalSecurity Pro. While the Internet gives you access to a large quantity of information and business opportunity, it also exposes your computer to a multitude of security threats and privacy breaches that most of us are not aware of. Internet threats are no longer limited to viruses; they extend to spyware, malicious active code, spam, hacking, etc. Whenever a computer connects to the Internet, it becomes a potential target for hackers. Using easily available tools such as spywares, worms and Trojan horses, computer hackers can snoop through private records, steal confidential information and take control of your computer without your knowledge. The complex and fast-spreading Internet threats take advantage of the software and operating system vulnerabilities and spread by using multiple hacker techniques. Modern Internet threats require proactive protection and monitoring of diverging software behaviour in systems combined with traditional signature-based virus and spyware protection. K7TotalSecurity Pro is a powerful but easy-to-use comprehensive security solution that offers protection against the new breed of threats. It is a centrally-managed solution consisting of a tightly-integrated virus protection, spyware protection, spam protection, identity protection and firewall. K7TotalSecurity Pro helps you to safeguard your computer from new emerging threats like network viruses, spam s, inappropriate content and spyware that can compromise your privacy. It puts you in total control of the communication in and out of your computer. More Information Components of K7TotalSecurity Pro Features of K7TotalSecurity Pro Overview of the Main Console Components of K7TotalSecurity Pro The components of K7TotalSecurity Pro are listed in the following table. Component Function AntiVirus Protection K7AntiVirus protects your computer from viruses, Trojans, Internet worms and harmful scripts. It scans all files that can be opened, executed or saved on your computer and all connected disk drives, and automatically detects and removes known viruses. K7Antimalware detects viruses and potential threats in messages and instant messenger attachments. It monitors the critical areas of your system for changes and warns you of the consequences. 1

8 K7TotalSecurity Pro Firewall Protection Privacy and Phishing Protection AntiSpam Protection Data Protection Parental Control K7FireWall monitors all incoming and outgoing Internet traffic to protect your system from Internet attacks. It controls the programs that access the Internet thereby preventing malicious programs from using your system to spread attacks. K7Privacy controls the information sent over the Internet via s and messenger programs. It enhances privacy and protects your identity by preventing surfing habits from being tracked. K7SpamFilter employs powerful filtering algorithms to automatically learn to identify the nature of the . It plugs into your computer s client program, and scans all incoming for spam subject matter. This component marks all spam s with a special header. Thus, it reduces the exposure to unsolicited commercial s, and mails containing offensive messages and images. This feature allows you to backup all your important data like documents, spreadsheets, pictures, music etc. You can now backup your important documents to any mapped drive. This can be an external drive/ network folder/ CD/ DVD/ flash drive/ camera/ smart phones. Parental Control allows you to block websites and applications/games and protect your kids from accessing inappropriate information. This feature allows you to filter both http and https websites. You can also block third party browsers from accessing the Internet. Web Protection Protects you from websites that can harm your computer, steal your sensitive information See Also Features of K7TotalSecurity Pro Feature Summary K7TotalSecurity Pro continuously monitors your system and protects it from known and unknown threats. The features in K7TotalSecurity Pro include: Auto-protection - loads into memory when Windows starts and provides continuous protection while you work; and monitors your system for unusual symptoms that may indicate an active threat Full on-access protection - provides maximum protection by scanning every file opened, executed or saved; and prevents the opening or executing of infected files Full online protection - checks all incoming and outgoing , providing full protection from -borne threats Integration with clients - adds buttons to the toolbar of supported clients 2

9 K7TotalSecurity Pro Instant messenger protection - scans and detects viruses in and instant messenger attachments Trojan protection - detects the activity of Trojan programs and recovers system files modified by Trojans Carnivore Drive-by-download blocking - Detects and blocks many zero day browser exploits that include automatic downloading of malicious software Carnivore Zero day threat blocking - Carnivore, a new pro-active defense mechanism allows the product to detect and block zero day attacks from PDF based exploits Protection from hackers - hides your computer from hackers; automatically detects which applications can connect to the Internet System security setting protection - prevents unauthorized changes to the system security settings Device Blocking - Allows you to set read/write/execute access to external devices such as USB sticks, CD/DVD, Floppy disks AutoScan USB - Scans USB disks as soon as they are plugged in AutoRun Protection - AutoRun Protection disables the autorun feature for all removable drives on your computer USB Vaccination - This feature ensures that once a USB drive is vaccinated, it cannot automatically infect any pc on which it is used using autorun mechanism USB Password Protection - Allows you to set password protection on the system on which the product is installed before accessing the device type Smart Firewall - monitors and protects your system from Internet attacks and suspicious behaviour Network Identification - Discovers the Network-Type for any network that you connect to and assigns an appropriate profile. Full Stealth on Direct Internet Connections - The firewall turns on stealth mode for all direct internet connections Intrusion detection - controls applications that are allowed to access the Internet and automatically detects and blocks any Internet attacks Spyware and adware protection - detects and removes spyware, adware, keyloggers and other Internet threats that get installed secretly while downloading programs from the Internet Automatic Sensitive Information Identification - Identifies sensitive information as you type and prompts you to save the information in Privacy Control. Privacy control - You can configure the Privacy settings and be assured that your private information remains private and is not sent out of your computer without your knowledge. Allowed and blocked lists - allows you to configure lists of individual addresses or whole domains from which you want to receive or block s Vulnerability Scanner - Detects and informs the users about vulnerable application modules that can be used by attackers to compromise the system Vulnerability Patches - Identifies vulnerabilities and provides steps to patch the system against vulnerabilities 3

10 K7TotalSecurity Pro Trusted Internet Application Knowledge - K7TotalSecurity Pro silently identifies trusted applications as they try to connect to the Internet and creates an appropriate rule to allow access K7 Boot CD - The K7 product cd can now be used as a bootable rescue disc to scan your system and remove viruses when your system does not boot in the normal mode due to malware infection Backup - Use K7TotalSecurity Pro Backup to prevent accidental loss of your data by taking a backup of important files to a CD, DVD, USB drive, local drive, external drive or network drive Independent Tool to Restore Backup - A stand-alone restore utility is provided to restore backups. Windows Explorer Icon Overlay Extension - This feature allows you to identify the files that were backed up, files that are pending backup etc., clearly with separate indicators over the standard Windows Explorer Icon Desktop Update Manager - This feature allows you to download updates in one system and push the updates to other systems using the Desktop Update Manager Spam rules - allows you to define custom rules to identify spam mails Smart analysis - utilizes self-learning Bayesian algorithms for spam recognition Online Spam Analyzer - compares s received against a centralized knowledge of latest spam located on an online lab to identify spams sent across various parts of the world Automatic threat handling - automatically repairs or removes infected files and other threats such as trojans, worms and spyware Automatic update - updates and installs copies of the virus and spam definition files automatically RootKits Scanner - Deep scan for rootkits can be used to scan the system generically for rootkits. Tracking cookies -bits of information stored on a computer by a browser which enable a website to uniquely identify a user. Phishing site blocker - protects you from web sites designed to trick you into sharing personal or financial information. Malicious site blocker - protects you from web sites that may contain malicious code that could be downloaded to your computer without your consent Gaming mode - When the Gaming mode is turned on, the product does not display alerts or popup messages and allows you to play games without any interruptions. Unwanted Registry entries - Scans the windows registry for registry entries left behind by malicious or unwanted programs. Scan unwanted files - Scans for the residual files left behind by malicious or unwanted programs. Password Protection - Users now have the option to set a password for changing the settings, disabling features and uninstalling the product Tools - The product comes with many useful tools like Windows Temp file cleaner, Internet Explorer History cleaner, Activity History Eraser, Virtual Keyboard etc. Web Protection - Protects you from websites that can harm your computer, steal your sensitive information See Also 4

11 K7TotalSecurity Pro Components of K7TotalSecurity Pro Online Help Conventions Window and dialog names are shown in plain type, capitalized as the names appear on-screen in the title bars: When you are finished, close the Settings dialog. Menu names, commands, buttons, and data entry fields are shown in bold text, capitalized as they appear on-screen: In the Main Console click on Settings menu and click Antivirus and Spyware to modify the configuration. Important notes are shown like this: Note: It is recommended that you select this option so that your computer is continually monitored. Warnings about important steps to take are shown like this: It is recommended that you do not disable K7TotalSecurity Pro, as it could lead to your system getting infected. Literal text that you type, or references to directories and file names is formatted in a monospaced courier typeface: Type program.exe and press the Enter key. Explanation for certain terms are displayed as pop-ups as shown below. Click on the term to view the information in a pop-up. Click outside the pop-up to close it. K7AntiVirus protects your computer from viruses, Trojans, and harmful scripts. Prompts and alerts that may appear on your screen are indicated as shown below. Click on the word "message" to view an image of the message. Click on the word "message" again to hide the image. A confirmation message appears. 5

12 K7TotalSecurity Pro References to other sections of the Online Help are formatted as such: See Updating Your Product for more information 6

13 Getting Started Activating Your Product Activation is essential to keep your product up-to-date so as to protect your computer from newly discovered threats. The K7TotalSecurity Pro software must be updated frequently to handle new viruses and threats. In order to receive updates and support from K7 Computing it is important that you activate your product. When you first install your software you are prompted to activate your product. If you do not activate when you are first prompted, you will receive an alert every day till you activate the product. To activate the product later, click the Cancel button. You can activate your product from the alert or from the K7TotalSecurity Pro Main Console. To activate your product with a serial number from the alert: 1. Click the Next button on the Product activation screen. 2. If you have purchased the subscription click on the radio option I have purchased the subscription and have a valid serial number. 3. Enter the Activation details, your Name, address. 4. Enter the Serial Number of your product and click Next. 5. In the confirmation screen if you want to change any details click the Back button. 6. Make sure you are connected to the Internet.Select Next button to proceed activation. 7. On successful Activation, you will receive your account information and License validity details. To activate your product as Evaluation product: 1. Click the Next button on the Product activation screen. 2. Click on the radio option I want to evaluate the product before purchasing it. 3. Enter the Activation details, your Name, address. 4. In the confirmation screen if you want to change any details click the Back button. 7

14 K7TotalSecurity Pro 5. Make sure you are connected to the Internet.Select Next button to proceed activation. 6. On successful Activation, you will receive your account information and License validity details. Once you have activated your product,click support to view your Licence Information. Opening the Main Console You can start K7TotalSecurity Pro in any of the following ways: Click Start->Programs->K7TotalSecurity Pro ->K7TotalSecurity Pro Double-click the icon in the System Tray Right-click the icon in the System Tray and then click the Open K7TotalSecurity Pro option See System Tray Icon The Main Console of K7TotalSecurity Pro opens and displays the current status of your product. See Overview of the Main Console 8

15 Getting Started Overview of the Main Console The layout of the K7TotalSecurity Pro Main Console is explained in the following figure. The Main Console has four distinct areas - The Menu Bar,The Status Bar, The Notification Area and Frequently used Task at the bottom of the screen. The Menu Bar consists of four menus - Settings, Reports, Support and Help. The Settings Menu allows the user to manage/access product settings. Users can manage Quarantine, View/Undo System Monitor events and access General Reports through the Reports menu. Users can Activate/Renew their product, access 'My Account' page and view registration details using the Support menu. The Status Bar indicates the overall protection status of the product. The Notification Area shows information about last updated date and time, virus definition information & subscription status. The Tasks section contains links to Scan, Update, Backup and Tools Several useful tools like Registry cleanup, USB Vaccination, Virtual keyboard etc can be accessed from the Tools Tab 9

16 K7TotalSecurity Pro Viewing the Current Status of Your Protection The K7TotalSecurity Pro Main Console shows the current status of the protection of your computer. To view the current status: 2. The Status bar indicates the overall protection status of the product. 3. Clicking on the 'Details' button opens the Security Status page that indicates which of the components of your product are enabled or disabled. If you have not updated your product in the last month, please update it immediately. See Updating Your Product for details Enabling K7TotalSecurity Pro K7TotalSecurity Pro is enabled by default. If you disable it for any reason, you can enable it again. It is recommended that you enable K7TotalSecurity Pro so that your computer is protected from viruses and threats continuously. To enable K7TotalSecurity Pro: 1. Right-click the icon in the System Tray. 2. Select Enable Product Protection. Disabling K7TotalSecurity Pro K7TotalSecurity Pro is enabled by default. You can disable the product. It is recommended that you do not disable K7TotalSecurity Pro, as it could lead to your system getting infected. 10

17 Getting Started To disable K7TotalSecurity Pro: 1. Right-click the icon in the System Tray. 2. Click the Disable Product Protection option. 3. A confirmation message appears. 4. If you are sure you want to disable K7TotalSecurity Pro, click Yes. 5. If you want to turn off K7TotalSecurity Pro for a short period of time,select the time period from the drop down. 6. Click No to leave K7TotalSecurity Pro enabled. Note: If K7TotalSecurity Pro is disabled, the K7 icon in the System Tray appears as such. Un-Installing K7TotalSecurity Pro Before you un-install K7TotalSecurity Pro restore the files you have quarantined to a safe location such as a marked floppy disk or CD. Note: To un-install K7TotalSecurity Pro you must be logged on as an Administrator. Also, you will need to restart your computer after removing the software. To remove K7TotalSecurity Pro: 1. Click Start->Settings->Control Panel. 2. In the Control Panel, double-click the Add or Remove Programs option. 3. Select K7TotalSecurity Pro in the Currently installed programs list and click Remove. 4. Follow the instructions on your screen to remove the software. 11

18 K7TotalSecurity Pro Manage Settings K7TotalSecurity Pro helps you to safeguard your computer from new emerging threats like network viruses, spam s, inappropriate content and spyware that can compromise your privacy. It puts you in total control of the communication in and out of your computer. K7TotalSecurity Pro takes the default factory settings during installation and you need not do anything else to stay protected. However, K7TotalSecurity Pro lets you customize the Firewall settings, Backup schedules or customize scans or protection settings. The Settings Tab allows you to customize the different settings of K7TotalSecurity Pro. The changes you have done to the settings can be backed up and restored later if required. To backup existing K7TotalSecurity Pro settings: 2. Click on Settings->General Settings 3. Click the Backup Existing Settings option. The Select or Enter the File Name to Backup dialog opens. 4. Locate the folder in which you want to save the file and then enter a name for the file. The settings are saved to a.dat file. To restore saved K7TotalSecurity Pro settings: 2. Click on Settings->General Settings. 3. Click the Restore from Backup option. The Select or enter the File Name to restore from dialog opens. 4. Locate the file (.dat) that has the required settings and click Open. Note: When you save the settings, they are saved to a.dat file. You can restore the K7TotalSecurity Pro settings to those that were loaded during the installation. To load the installation settings: 2. Click on Settings->General Settings. 3. Click Load Install Settings option. The system warns you that the existing settings will be discarded and asks you to confirm the action. 4. If you select Yes, the settings are restored to the default factory settings. Note: You will need to reboot the computer for the changes to take effect. 12

19 Getting Started Set Password The K7TotalSecurity Pro Settings can be protected with a password. It protects the product settings from unauthorized access. To set password protection for settings: 2. Click on Settings->General Settings 3. Select the option Needs password access to change settings and disable protection. 4. Choose the option Click here to change or set password to set a password of your choice. Password protection alert Password protection is enabled for the product. You can do the following: 1. Provide the administrator password you had set for the product in the text box provided in the alert window. This allows you to access/change the configuration settings of the product. 2. If you do not want to be prompted for the product administrator password until you log off your Windows account, select the check box Do not prompt again until I log off. Note: Please remember the password. In case you forget the password, it cannot be retrieved. You will need to remove and reinstall the product. 13

20

21 Managing Alerts Configuring Alerts K7TotalSecurity Pro automatically alerts you whenever a threat or virus attack is detected. You also receive alerts when changes occur in your computer or when updates are completed. Alerts are displayed as pop-ups and have a text area that displays the message. You can configure the appearance of the pop-up and how alerts should appear. To configure the alerts: 2. Click on Settings->General Settings 3. Select the check boxes for the required options. The options are described in the table below. Option Description Display Startup Splash Screen Display Non-Critical Messages Displays the splash screen when K7TotalSecurity Pro starts up. This option is selected by default. Displays all alerts including critical and non-critical messages 4. Click the Close button to save the settings. 5. Once you have configured the alert settings, you can do any of the following: Back Up the Product Settings Restore Product Settings from the backup Load the Installation Settings 15

22 K7TotalSecurity Pro Gaming Mode Alert Enabling Gaming Mode When the gaming mode is Enabled,virus alerts and updates will be displayed in the background and there will be no disturbance for the user while playing the game. To enable the gaming mode: 1. Right-click the icon in the System Tray,point to Enable gaming mode. 2. User can choose the time duration for which the Gaming Mode option should be applied. Disable Gaming Mode When the gaming mode is Disable, virus alerts and updates will be displayed in the background and there will be disturbance for the user while playing the game. To Disable the gaming mode: 1. Right-click the icon in the System Tray,Click to Disable gaming mode. 16

23 Updating Your Product Updating Your Product In order to protect your computer from newly discovered viruses and threats you must keep the K7TotalSecurity Pro product installed on your computer up-to-date. Your computer's security depends directly on updating the threat signatures and program modules regularly. Product updates are improvements on your installed product. Updates can be obtained from the K7 Computing web site for the duration of your license. When your license is due to expire, you will be prompted to renew it. Select Renew Now and follow the instructions to renew your license. Once the license is renewed, the product automatically checks for updates. Your product must be Activated before you update it. K7TotalSecurity Pro is automatically configured to check for updates when you are connected to the Internet, and then notify you with alerts. You can configure K7TotalSecurity Pro to notify you before downloading and installing updates. Note: You must be connected to the Internet for K7TotalSecurity Pro to check for available updates. You can choose to Automatically check for updates Manually check for updates Disable automatic checking for updates Automatically Checking for Updates You can configure your product to check for protection updates automatically. New updates are posted on the K7 Computing web site. If you configure your product to check for updates automatically, it will obtain the new updates from the K7 Computing web site without intervention from you provided your Internet connection is available. The product will check for updates every five minutes, and after a successful update it will connect to the K7 Computing site again to check for updates after three hours. To configure your product to automatically check for updates: 1. Open the K7TotalSecurity Pro Main Console and click the Update icon at the bottom of the page. 2. Click Configure Update. The Options dialog opens. 3. Select the Automatically check for updates check box. 4. You can choose the sequence in which the update is checked: Use Internet Only - this will download the update directly from the K7Computing web site. Use Internet, if not present use K7Local Update Server - the update files is checked directly from the web site, if the web site is unable to be connected then it checks for the update from the Local 17

24 K7TotalSecurity Pro update server specified. You can specify the address of this Local update server and the port in the space provided below. Use the Local update Server only - this will take the update from the specified local update server. Systems that are not connected directly to the Internet can get the updates from the Local Update server. Use K7Local Update Server, if not present use Internet - the local sever is checked for latest updates. If unable to connect to the Local update server then the K7Computing server is checked for updates. 5. If your Internet connection is through a proxy server, select the Access Internet through a Proxy Server check box and enter the details of the proxy server in the fields provided. 6. If you need to specify the Local Update server then specify the Local K7Update server address and the port number in the space provided. 7. Click OK to close the Options dialog. 8. Make sure you are connected to the Internet and click Run update now. Your product connects to the K7 Computing web site and downloads the updates. A message indicating the status of the update is displayed. Your product must have a valid license to update your product. If your license period has lapsed, you are warned. 9. Once the product has been updated you will need to close all open applications and reboot your computer. Using the Desktop Update Manager When you do not have internet connection in all the systems in which K7TotalSecurity Pro is installed, you can download the update via Desktop Update Manager, and then all the systems in which K7TotalSecurity Pro is installed can take the updates from this update Manager system. To configure your system as the Desktop Update Manager: 1. Click Start -> All Programs -> K7TotalSecurity Pro -> Local Update Server -> Start Server To stop using your system as the Desktop Update Manager 1. Click Start -> All Programs -> K7TotalSecurity Pro -> Local Update Server -> Stop Server To configure other systems to pick up updates from the Desktop Update Manager: 1. Open the K7TotalSecurity Pro Main Console and click the Update icon at the bottom of the page. 2. Click Configure Update. The Options dialog opens. 3. Under the section Select the sequence, select Use K7 Local Update Server only. 4. Specify the Local K7Update server address and the port number in the space provided. 5. Click OK to close the Options dialog. 18

25 Updating Your Product 6. Click on Run update Now in order to check for updates from the Local Update Server now. Manually Checking for Updates Perform a manual update of your product anytime to ensure that you are using the latest protection updates. In addition, it is recommended that you perform a manual update whenever there is a threat outbreak, or if you suspect that your computer is infected, and a scan did not detect any threats. To manually check for updates: 1. Open the K7TotalSecurity Pro Main Console and click the Update icon at the bottom of the page. 2. Make sure you are connected to the Internet and click Run update now. Your product connects to the K7 Computing web site and downloads the updates. A message indicating the status of the update is displayed. Your product must have a valid license to update your product. If your license period has lapsed, you are warned. 3. Once the product has been updated you will need to close all open applications and reboot your computer for the update to take effect. Disabling Automatic Updates For maximum protection, it is recommended that you configure K7TotalSecurity Pro to automatically download and install updates. However, if you want to manually update your product, you can disable the automatic updating feature. To disable automatic updating: 1. Open the K7TotalSecurity Pro Main Console and click the Update icon at the bottom of the page. 2. Click Configure Update. The Options dialog opens. 3. By default, the system is configured to automatically download and install updates. Clear the Enable Automatic Update check box to prevent K7TotalSecurity Pro from automatically checking for updates. 4. Click Close. Note: If you disable the automatic update, you must manually check for updates at leas twice a week to ensure that your computer is protected with the latest security updates. 19

26 K7TotalSecurity Pro 20

27 Protecting Against Viruses Managing the Virus Protection The AntiMalware component of K7TotalSecurity Pro provides a reliable and up-to-date virus protection. It continuously scans your system in the background and prevents virus infection from files coming in through attachments, instant messenger, Internet downloads and through vulnerability exploits. It also scans for certain non-virus threats like spyware, adware, and other attack tools. To manage the virus protection: 1. Double click the icon in the System Tray. The K7TotalSecurity Pro Main Console opens. 2. Click Details. 3. The Status of the protection is indicated by a green ON button next to each component. The product indicates if the Real-Time Scanner, Behavioral Monitor, Exploit Protection, System Monitor and Browser Protection are enabled. 4. The version of the Virus Definition files were last downloaded is displayed on the Home Page. To update the virus definition, click the Update option at the bottom of the page and choose the Run update now option. See Manually Updating Your Product for more information 5. The Scan option at the bottom of the page has options to do the following: Rootkit Scan Tracking cookies Quick scan Vulnerability Scan Abnormal Changes scan 6. Clicking on Reports at the top of the page allows the user to view the following: View System Monitor Events Manage Quarantined Files Security History 7. To configure the AntiVirus Protection settings, click on Settings at the top of the page and choose AntiVirus and AntiSpyware. The Configure AntiVirus dialog opens. See Configuring the AntiMalware for more information 8. If you want to scan multiple locations on your computer, click on the Scan option at the bottom of the home page and choose Custom Scan. See Scanning Multiple Locations for more information 9. To configure and schedule scan tasks, click the Scan option on the Home page and choose the appropriate option. See Configuring Scan Tasks for more information Configuring the AntiMalware 21

28 K7TotalSecurity Pro You can configure the AntiVirus component of K7TotalSecurity Pro to manage real-time viruses and infected s. It also provides script and instant messenger protection. To configure the AntiVirus: 2. To configure the AntiVirus Protection settings, click on Settings on the Home page and choose AntiVirus and AntiSpyware. The Configure AntiVirus dialog opens 3. Using the options provided in this dialog, you can do the following: Configure the RealTime Scanner Configure the Scanner Configure the System Monitor Configure Instant Messenger Protection Configure the Scan Settings Configure Device Access Configure Carnivore Configure the General Scan Settings Configuring the Real-Time Scanner Configuring the Real-Time Scanner By default the virus protection (real-time scanning) is enabled. It constantly monitors your system for virus activity. The Sentry scans files each time you or your computer accesses them. When a virus is detected, the AntiMalware protection attempts to clean or remove the infection. To configure the Real-Time Scanner: 2. Click on Settings at the top of the page and choose Real Time Protection under AntiVirus and AntiSpyware. 3. Under What to Scan, select the types of files you want to scan. The options are described in the following table. Option Description All Files Automatic Identification Scans all files Scans all executable files, Microsoft documents and script files. To select the required options, click the customize option. The Types of Files to Scan dialog appears. Select the Type of Files to Scan and click OK. See Selecting the Types of Files to Scan for details 22

29 Protecting Against Viruses Specific Extensions Scan Files on Network Scans files with the specified extensions. In addition to the default list of file extensions that K7AntiVirus is configured to scan, you can add other extensions. To do so, click the customize option. The Types of File Extensions to Scan dialog appears. Add the Extensions and click OK. See Adding File Extensions for Scan for details Scans files on the network Detect Spywares and adwares Select the check box if you want the Sentry to scan the files for threats such as spyware, adware, etc. Click customize to select the types of threats to scan and the action to take when a selected threat is identified. See Defining Types of Threats to Scan for details 4. Under Action to Take When a Virus is Found, select an action to be taken if a file is found to be infected. The actions are described in the following table. Action Description Clean or Remove the infected files Deny access Clean files that are infected or Remove the Malware file without any interaction from you. An alert is displayed with the details of the detection and the action taken. Restricts access to the infected file 5. You can exclude files or folders from being monitored. If you want to exclude files or folders, click the Manage Exclusions option on the Sentry tab. See Managing Exclusions for details 6. Once you have configured the Sentry, click Apply to save the changes. Enabling Real-Time Scan The real-time scan is enabled by default. If you disable it for any reason, you can enable it again. It is recommended that you have the real-time protection enabled all the time so that your computer is protected from viruses and threats continuously. To enable the Real-Time scan: 2. Click on Details on the Protection Status Bar. 3. The status of the real-time protection is indicated by a red OFF button if the option is disabled. When Real Time protection is enabled, the status is indicated by a green ON button. 4. If the real-time protection is currently disabled, click the ON button. 23

30 K7TotalSecurity Pro Disabling Real-Time Scan The real-time scan is enabled by default. You can disable the real-time scan. It is recommended that you do not disable the real-time protection, as your computer could get infected with viruses. To disable the Real-Time scan: 2. Click on Details on the Protection Status Bar. 3. The status of the real-time protection is indicated by a red OFF button if the option is disabled. When Real Time protection is enabled, the status is indicated by a green ON button. 4. If the real-time protection is currently enabled, click the OFF button to disable the real-time scan. 5. A confirmation message appears. 6. If you are sure you want to disable the real-time scan, click Yes. 7. If you want to turn off the real-time protection for a short period of time, choose a time option in the drop down box. 8. In order to disable it permanently choose the Permanently option in the drop down box. 9. In order to disable only until restart choose the Until System restarts option in the drop down box. 10. Click No to leave the real-time protection on. Note: If the real-time scanner is disabled, the K7 icon in the System Tray appears as such. 24

31 Protecting Against Viruses Configuring the Types of Threats to Scan You can define the additional threats you want K7AntiVirus to identify during the manual, real-time and scan. To define additional threats: 2. Click on Settings at the top of the page and choose Real Time Protection under AntiVirus and AntiSpyware. 3. Select the Detect Spyware and adwares check box and click the customize option. The Types of Threats to Scan dialog opens. 4. Select the appropriate check boxes to define the types of What Threats to identify. The types of threats that K7AntiVirus can identify are described below. Threat Description Viruses, Worms and Trojans Security Risks Spywares Adwares Dialers Joke Programs Network Access Hacker tools Viruses, Trojans and Internet worms. These are scanned by default. Known programs that may or may not be a risk to your computer, but have worm properties Stand-alone programs that monitor your system activity in the background and can detect and send confidential information such as passwords out of your computer Stand-alone programs in which advertising banners are displayed while the program runs. These programs usually include code that tracks a user's personal information and passes it on to third parties. Programs that dial out without your knowledge to other prone or ftp sites basically to make charges Programs that change the normal behaviour of your system like making sticky keys or changing the function keys Programs that allow others to access your computer through the Internet to gather information or attack your computer Programs or tools used by hackers to gain unauthorized access to your computers. These could be simply Keyboard loggers that capture keystrokes and send the information to the hacker. 5. Select an option to specify what Action needs to be taken when the selected threats are identified. The actions that can be taken are detailed below. Action Description 25

32 K7TotalSecurity Pro Clean or Remove the infected file Deny access Clean or remove the infected file from your computer Deny access 6. Click OK to save the settings. Managing Exclusions You can exclude certain files and areas such as folders or programs from the scan. To manage exclusions: 2. Click on Settings at the top of the page and choose Real Time Protection under AntiVirus and AntiSpyware. 3. Click the Click Here to Manage Exclusions option. The Exclude List dialog opens. 4. The list of folders and files excluded from protection is displayed. 5. To add the folders or files you want to exclude from protection, click Add Entry. 6. In the Add New Exclude Entry dialog that appears, enter the path of the folder or file. If you are not sure of the path, click Add Folder or Add File to select the folders or files respectively. 7. To delete all the excluded entries you added from the scan result window click on the link Click here to clear Malware trace exclusion 8. Select the following options: Ignore from RealTime Scanner - to exclude the selected file or folder from the real-time scan Ignore from Offline Scanner - to exclude the selected file or folder from the offline scan Include Subfolders - to exclude subfolders under the selected folder from the scan. This option is not available when a file is selected for exclusion. 9. Click OK to save the new entry and return to the Exclude List dialog. 10. To remove a file or folder from the Exclude list, select the entry in the list and click Remove. 11. Click OK to save the exclusion settings. Configuring the System Monitor Configuring the System Monitor The System Monitor continuously monitors the critical areas of your computer and warns you of the consequences of any changes made to your system. It helps in the early detection of viruses, and protects your computer from hidden threats before they run. 26

33 Protecting Against Viruses To configure the System Monitor: 1. Double-click the icon in the System Tray. The K7TotalSecurity Pro Main Console opens. 2. Click on Settings at the top of the page and choose AntiVirus and AntiSpyware. 3. Click on the System Monitor tab. 4. Select the Level of Protection you want the System Monitor to use when checking for spyware. The levels are detailed in the following table. Level of Protection High Medium Low User Defined Monitors all check points for spyware Description Monitors most check points except non-critical points Monitors only the most critical check points Allows you to select the check points you want the System Monitor to check based on your requirement See Configuring the System Check Points for details 5. To set additional Options, select the required check boxes. The options are described in the following table. Option Automatically allow all files that are digitally signed Automatically allow all files that System Monitor recognizes Always prompt if changes are found when a new software is installed Allows all files that are digitally signed Description Allows all files that the System Monitor recognizes Prompts if the changes detected indicate that a new software is being installed.this is automatically selected when the Protection Level is High. 6. Click Apply to save the settings. Enabling the System Monitor The System Monitor is enabled by default. If you disable it for any reason, you can enable it again. Note: It is recommended that you enable the System Monitor so that the critical areas of your computer are monitored continuously. To enable the System Monitor: 2. Click on Details on the Protection Status Bar. 27

34 K7TotalSecurity Pro 3. The status of System Monitor protection is indicated by a red OFF button if the option is disabled. When Real Time protection is enabled, the status is indicated by a green ON button. 4. If the System Monitor is currently disabled, click the ON button Disabling the System Monitor The System Monitor is enabled by default. You can disable the System Monitor. It is recommended that you do not disable the System Monitor, as your computer could be affected by hidden threats. To disable the System Monitor: 2. Click on Details on the Protection Status Bar. 3. The status of System Monitor protection is indicated by a red OFF button if the option is disabled. When Real Time protection is enabled, the status is indicated by a green ON button. 4. If the System Monitor is currently enabled, click the OFF button to disable the System Monitor. 5. A confirmation message appears. 6. In order to disable it permanently choose the Permanently option in the drop down box. 7. In order to disable only until restart choose the Until System restarts option in the drop down box. 8. If you are sure you want to disable the System Monitor, click Yes. 9. If you want to turn off the real-time protection for a short period of time, choose a time option in the drop down box 10. Click No to leave the System Monitor enabled. 28

35 Protecting Against Viruses Configuring the System Check Points To configure the system check points that System Monitor should monitor: 2. Click on Settings at the top of the page and choose AntiVirus and AntiSpyware. 3. Click on the System Monitor tab. 4. Under Select Level of Protection, select the User Defined option and click the customize option that appears below it. The System Monitor Check Points dialog opens. 5. By default all the options are selected. Select or clear the required system check points. See System Monitor Check Points for details 6. The System Monitor will monitor only the selected check points for any changes. 7. Click OK to save the settings. Viewing System Monitor Events The System Monitor helps protect your computer, privacy and personal information from hidden threats before they run, stopping most spyware threats before they install. When the System Monitor is enabled, it continuously monitors your computer and warns you when any changes have taken place or when any suspicious program is trying to enter your computer. When the warning appears, you can either allow the changes to take place or block the changes. The changes that have been allowed or blocked are tracked. You can view and undo the action taken when the warning appeared. To view and undo the changes: 2. Select the Reports option at the top. 3. Choose System Monitor Events option. The System Monitor - Blocked Entries dialog appears. 4. The list of Blocked Events is displayed. 5. Select an event from the list and its Details appears on the dialog. 6. To view more information on the event, click the More about this entry option. 7. If you want to undo the change made by the program, select the event in the list and click the UnBlock option. 8. Click Close to close the dialog. Managing Quarantined Files 29

Printed Documentation

Printed Documentation Printed Documentation Table of Contents K7AntiVirus Premium...1 K7AntiVirus Premium Help... 1 Feature Summary... 2 Online Help Conventions... 3 Managing the Alerts... 9 Configuring Alerts... 9 Backing

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 9 ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on

More information

Sophos Endpoint Security and Control Help

Sophos Endpoint Security and Control Help Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Quick Start Guide. www. K7Computing.com

Quick Start Guide. www. K7Computing.com Quick Start Guide Table of Contents Before you install the Product... 3 Installing the program... 3 Quick Installation... 4 Custom Installation... 4 Installation... 7 Activation... 8 Offline Activation...

More information

ANTIVIRUS AND SECURITY SOFTWARE

ANTIVIRUS AND SECURITY SOFTWARE Toshiba Security Support ANTIVIRUS AND SECURITY SOFTWARE d ANTIVIRUS AND SECURITY SOFTWARE The purpose of this document is to help users make the most of the security software that comes preloaded on Toshiba

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Sophos Endpoint Security and Control Help. Product version: 11

Sophos Endpoint Security and Control Help. Product version: 11 Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

Security and Protection in Real-Time

Security and Protection in Real-Time Security and Protection in Real-Time Product White Paper Aug 29, 2006 ParetoLogic Anti-Spyware offers an advanced set of tools designed to protect your computer from spyware threats. There are two lines

More information

Seqrite Antivirus Server Edition

Seqrite Antivirus Server Edition Seqrite Antivirus Server Edition User Guide www.seqrite.com Copyright & License Information Copyright 2016 Quick Heal Technologies Ltd. All Rights Reserved. No part of this publication may be reproduced,

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 Enable

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 SP1 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

Avira System Speedup. HowTo

Avira System Speedup. HowTo Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Total Protection Service

Total Protection Service User Help McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Antivirus. Quick Start Guide. Antivirus

Antivirus. Quick Start Guide. Antivirus Antivirus 2007 Antivirus plus I Firewall Quick Start Guide Helpful Information on Installation and Set-Up STOPS and Removes Viruses DELIVERS Proactive Firewall Protection EASY to Set Up and Use FREE Upgrades

More information

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

SystemTech AntiSpyware Manual

SystemTech AntiSpyware Manual Summitsoft Corporation SystemTech AntiSpyware Manual This guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

Outpost Pro PC security products Security Suite, Antivirus, Firewall

Outpost Pro PC security products Security Suite, Antivirus, Firewall agnitum.com PC security products Security Suite,, Firewall Version 9 The Outpost product line including Outpost Security Suite Pro, Outpost Pro, and Outpost Firewall Pro protects against all types of malware,

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

Kaspersky Internet Security

Kaspersky Internet Security Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Laplink PCmover Windows Upgrade Assistant

Laplink PCmover Windows Upgrade Assistant Laplink PCmover Windows Upgrade Assistant User Guide Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Tel (USA): +1 (425) 952-6001 Fax (USA):

More information

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

STANDARD ON CONTROLS AGAINST MALICIOUS CODE EUROPEAN COMMISSION DIRECTORATE-GENERAL HUMAN RESOURCES AND SECURITY Directorate HR.DS - Security Informatics Security Brussels, 21/06/2011 HR.DS5/GV/ac ARES (2011) 663475 SEC20.10.05/04 - Standards European

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Norton Internet Security Product Manual

Norton Internet Security Product Manual Product Manual Norton Internet Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

User's Guide. Copyright 2010 BitDefender

User's Guide. Copyright 2010 BitDefender User's Guide Copyright 2010 BitDefender BitDefender Antivirus Pro 2011 User's Guide Published 2010.07.30 Copyright 2010 BitDefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Worry-Free TM Remote Manager TM 1

Worry-Free TM Remote Manager TM 1 Worry-Free TM Remote Manager TM 1 for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Bitdefender Total Security 2015 User's Guide

Bitdefender Total Security 2015 User's Guide USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

avast! Free Antivirus 7.0 Quick Start Guide avast! Free Antivirus 7.0 Quick Start Guide

avast! Free Antivirus 7.0 Quick Start Guide avast! Free Antivirus 7.0 Quick Start Guide avast! Free Antivirus 7.0 Quick Start Guide 1 Welcome to avast! Free Antivirus 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even less resource-hungry

More information

USER MANUAL SlimComputer

USER MANUAL SlimComputer USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Internet Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Bitdefender Total Security 2016 User's Guide

Bitdefender Total Security 2016 User's Guide USER'S GUIDE Bitdefender Total Security 2016 User's Guide Publication date 01/28/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0. User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Quick Heal Exchange Protection 4.0

Quick Heal Exchange Protection 4.0 Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from

More information

ADMINISTRATOR'S GUIDE

ADMINISTRATOR'S GUIDE KASPERSKY LAB Kaspersky Security 5.5 for Microsoft Exchange Server 2003 ADMINISTRATOR'S GUIDE KASPERSKY SECURITY 5.5 FOR MICROSOFT EXCHANGE SERVER 2003 Administrator's Guide Kaspersky Lab http://www.kaspersky.com

More information

Kaspersky PURE User Guide

Kaspersky PURE User Guide Kaspersky PURE User Guide Application version: 3.0 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions

More information

Page 1. Max Total Security

Page 1. Max Total Security Page 1 Max Total Security Thank you for choosing Max Total Security to keep your Windows PC safe and protected from all types of virus and Malware. This document will be revised as and when required due

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information